4,157 research outputs found
Internally supported flexible duct joint
An internally supported, flexible duct joint for use in conducting fluids under relatively high pressures in systems where relatively large deflection angles must be accommodated is presented. The joint includes a flexible tubular bellows and an elongated base disposed within the bellows. The base is connected through radiating struts to the bellows near mid-portion and to each of the opposite end portions of the bellows through a pivotal connecting body. A motion-controlling linkage is provided for linking the connecting bodies, whereby angular displacement of the joint is controlled and uniformity in the instantaneous bend radius of the duct is achieved as deflection is imposed
Universal bellows joint restraint permits angular and offset movement
Universal joint-type restraint that employs ball joints permits maximum angular and lateral offset movement in a bellows joint without danger of rupture or pressure drop in the line. It is used in high pressure and high temperature applications in refineries, steam plants, or stationary power plants
Mindful Administration of IS Security Policies
Managers of information systems have ethical, moral and legal obligations to protect their organization’s intellectual property. They often look to frameworks such as the Control Objectives for Information and related Technology (CobIT) to guide them to what data needs to be secured or standards such as the ISO/IEC 27000 series to provide best practices regarding their policies on how to safeguard this information. However, these policies are either vague in the details or not fluid and flexible enough to account for the unexpected security events that may render them obsolete. For example, Google recently released an online suite of applications that would allow an organization’s employees to collaborate on items of intellectual capital stored on Google’s servers outside the control of the organization’s information technology (IT) department. Additionally, new techniques have been discovered to break the encryption of data that was previously thought to be lost when the device containing it was powered off. While these events certainly have utility to practitioners, they also pose new threats to the security of intellectual capital created and stored on IT artifacts. This paper advocates mindfulness (Weick and Sutcliffe, 2001) as a necessary component of choosing and adapting security policies to better predict the unexpected security threats that may come as a result of technological change, environmental forces, or organizational use of IT
- …